Analysis
-
max time kernel
138s -
max time network
149s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
11-10-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
5c93b6875ee294f03b29b390102809e9daf2efac67717e3b92231d49e4fc3467.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5c93b6875ee294f03b29b390102809e9daf2efac67717e3b92231d49e4fc3467.apk
Resource
android-x64-20240624-en
General
-
Target
5c93b6875ee294f03b29b390102809e9daf2efac67717e3b92231d49e4fc3467.apk
-
Size
9.3MB
-
MD5
7912474dba7df6d46e8abd3ad47ed8ed
-
SHA1
6ba6184aaa44070bdfc2bf8df9708d0a4356a250
-
SHA256
5c93b6875ee294f03b29b390102809e9daf2efac67717e3b92231d49e4fc3467
-
SHA512
ce3ed9df56e0d5dbc6d1bcda83c997c86d91021325f6c17cab81fffc9a01f83beaa80de71bf1ca7c214a631a2429848da34d55f8e97466ef3c351b47cfde5aaf
-
SSDEEP
98304:GTiYcdoC796L81vcj7VRsz0nVKC55iSRGQCI7pxlpXU8Abu5nQ1LAjAM:GZcq1LQEj7VR6MUmrs4dQlAT
Malware Config
Extracted
octo
https://0e97556072acd897b127d53221a49ecb.com
Signatures
-
Octo
Octo is a banking malware with remote access capabilities first seen in April 2022.
-
Octo payload 1 IoCs
resource yara_rule behavioral1/memory/4268-1.dex family_octo -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.xjinterval88decreasefiles/app_palm/oOkF.json 4294 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xjinterval88decreasefiles/app_palm/oOkF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xjinterval88decreasefiles/app_palm/oat/x86/oOkF.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.xjinterval88decreasefiles/app_palm/oOkF.json 4268 com.xjinterval88decreasefiles Anonymous-DexFile@0xcb078000-0xcb0fbaec 4268 com.xjinterval88decreasefiles -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.xjinterval88decreasefiles Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.xjinterval88decreasefiles -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.xjinterval88decreasefiles -
Makes use of the framework's foreground persistence service 1 TTPs 1 IoCs
Application may abuse the framework's foreground service to continue running in the foreground.
description ioc Process Framework service call android.app.IActivityManager.setServiceForeground com.xjinterval88decreasefiles -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.xjinterval88decreasefiles -
Queries the unique device ID (IMEI, MEID, IMSI) 1 TTPs
-
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS com.xjinterval88decreasefiles -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.xjinterval88decreasefiles -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.xjinterval88decreasefiles -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.xjinterval88decreasefiles -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.xjinterval88decreasefiles
Processes
-
com.xjinterval88decreasefiles1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Makes use of the framework's foreground persistence service
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Uses Crypto APIs (Might try to encrypt user data)
- Checks CPU information
- Checks memory information
PID:4268 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.xjinterval88decreasefiles/app_palm/oOkF.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.xjinterval88decreasefiles/app_palm/oat/x86/oOkF.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4294
-
Network
MITRE ATT&CK Mobile v15
Persistence
Event Triggered Execution
1Broadcast Receivers
1Foreground Persistence
1Defense Evasion
Download New Code at Runtime
1Foreground Persistence
1Hide Artifacts
1User Evasion
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48B
MD5046a414913add6f5bb60072c7db819b6
SHA1451ee4f6809260aec622d772fd329c7d0297a842
SHA256b66c1320cb063a1d391c94273572ea6edae76c8c8b0a07f8d75c88686f0df72a
SHA5124e6355f3051ed5e811ab030abde1f5be7f5e1cf33be99cd08477e9b6c015deb1d8bd75a09fb9c7176b8511c5ad0a67abc0902a3531e97564ccb6afc57496a47c
-
Filesize
1014B
MD5e1ca4d9824c21e63d7320726f1932396
SHA1d1aaa0ea5959194e0fae2ff6c798710b3f558e75
SHA256411ed6cb7481f3913d6831b3de442d195f1a308f815652d2d3f0ed80fa00614d
SHA51215c63aa440cb142dbae77b97ec04de9db38ebf7cd81f9e393ee85d8a820cb770f48aba26724ad727e9f65280139b560409c22326987ac82f0a1e5da7a99c5451
-
Filesize
1014B
MD52e3e23c8061d573a3671883341d0b1cb
SHA1304b82c9cf51cbb1fabc29e0702ad056b3ad08a6
SHA256f09df48020d1968d78ec1c9e57233cfe37e957fe21acb360a0a974e7323a080a
SHA512c12da190094a8c82960eb74b186b2fc76ee90b29e0b669b2b6df8431fd68374df89f54463f2122fa5ef86399b751d54147da68730af27f1e9d62c7d36ff3d4f1
-
Filesize
307KB
MD54e73947cabb5db3f92ca85004981b754
SHA16d9667fdb0280ed2dcb782b4683e422a51bdc601
SHA2566db94232e756b90ed437f1bc87dc38cf20fb2e7c7a19a5e40c6c17254b7e234c
SHA512be8b500a7070af1dfb53b0cf1a7b327dadc4e163a6dad905496ac228c58cd1ed87b054533917924455d35e9b300683ae33e1bcdd91935a5dbae1d693c3e13d69
-
Filesize
1KB
MD567e17d4a03fde8cba2db3f295d77a8c1
SHA1087bf8b9e455711c2841450e41650ba5adf462b9
SHA25650667efece989387353a7defa95bbf1aa7256fed51ed9a5b4a377d51a5ce7e1a
SHA5124f36761b46e152fd9e576fe59b1d82963703d8860fa73e1f8360776e1029dd567bcfa9ad4c1790bd7132a544e19f494e74fc9dd61c7eae5b27c84dfa090ccfc3
-
Filesize
1KB
MD53ddb8ea60726636acb375ac123b24373
SHA17c378d69df933d8f3a49d912be58aa342ed00a67
SHA25601cd181666562bfff5fabefe701c3970da5591cc6f36c50fb4d4e6c3937aa855
SHA5129709c2ee75be25d74e9c0d791988b139cc4d481bf6747856aa3c71b73075a4fb3023618aa371c95c55ef30f5bc2954967013ca1ae67a1d7886a97592c45b372f
-
Filesize
526KB
MD50299f010481e31087113107d7e3ddc83
SHA1b4fe16ebb310db29ac49d768765ce2be9a3995c5
SHA25697f889ba6c7eed72595c43c2b456e2e05c90c9b5aebf47ca55f58f210dbeeddb
SHA51204af750946182571c1b1ecba2fa55a60d7de6703aafcfa4b59470f6ed765747a27bc29684d849ec1215afded08644ead4cb61aee054cb67eec75be51d2c96c57